Search results for "ATTAC"

showing 10 items of 610 documents

Quality of attachment, family relationships and socio-cultural influences in adolescents affected by eating disorders: a pilot research

2008

attachment family eating disorders
researchProduct

The mediating role of vulnerability factors in the association between attachment and internalizing/externalizing problems

2015

Recent research indicates that secure attachment is a protective factor against the development of internalizing / externalizing behavioral problems (Laible et al., 2000), while the role of insecure attachment is more controversial, raising the question of potential mediating variables (Brumariu & Kerns, 2010). In literature it emerges how Blatt’s two-configurational model (self-definition and relatedness) correlates on the one hand with the attachment (Luyten & Blatt, 2011; Mikulincer & Shaver, 2007), and on the other with the internalizing / externalizing spectrum (e.g. Campos, Besser, Morgado, & Blatt, 2014). This research has explored the mediation effects of relatedness (dependency) an…

attachment internalizing/externalizing problems
researchProduct

Psicobiologia dell'attaccamento

2008

In this work, the emotional and cerebral development of the individual is treated as a complex process, within which genetic and experiential factors interact; equal focus is given to these factors as is through the interactions of both that the human brain achieves full maturity. The recent literature on neuroscientific findings has allowed to understand further which are the mechanisms that play the most important role in the human brain. In particular, this recent work has pointed out the importance of precocious experiences of emotional syntonization between the baby and its development partners; the quality of the experiences that such partners will be able to provide will configure no…

attachment neurotransmittersorbito-frontal cortex development experiences emotional regulation
researchProduct

Il legame di attaccamento ai genitori e ai pari come predittore dell’autostima e dell’ego-resiliency.

2017

The aim of this study was to analyse the relationship between the quality of attachment relationships with parents and peers on the one hand, and ego-resiliency and self- esteem on the other hand. The present research was conducted with a group of 218 students (male = 101) aged from 11 to 19 years (M = 14.43, DS = 2.60). The results emphasize that (a) self-esteem is positively associated only with security of attachment to the mother, (b) ego-resil- iency is positively associated with security of attachment both to mother and peers, and (c) boys seem to have higher levels of self-esteem and ego-resiliency than girls.

attachment self-esteem ego-resiliency gender peers
researchProduct

Nothing Left but the Core of Murmurs? : Attacks on Linking as Communication in Beckett’s The Unnamable

2022

Literary studies have usually interpreted Samuel Beckett’s The Unnamable (1959) to reflect an area void of meaning and inaccessible to representation. The present article, by contrast, argues that Beckett experientially communicates archaic psychic reality where certain contents develop in an interpersonal relationship. The article offers psychoanalytical close readings of a few key passages in the text, where the function that is integrated in the narrative voice and actively destroys connections manifests itself on different textual levels. Using the psychoanalyst Avner Bergstein’s interpretation of Wilfred Bion’s concept, “attacks on linking”, as a paradoxical form of communication, the …

attacks on linkingBion Wilfredpsykoanalyyttinen kirjallisuudentutkimusprojective identificationcommunicationpsykoanalyytikottulkintatransferencetransferenssiBeckett Samuelinterpretationviestintä
researchProduct

Data Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods

2022

Cyber Physical Systems (CPSs) have become widely popular in recent years, and their applicability have been growing exponentially. A CPS is an advanced system that incorporates a computation unit along with a hardware unit, allowing for computing processes to interact with the physical world. However, this increased usage has also led to the security concerns in them, as they allow potential attack vendors to exploit the possibilities of committing misconduct for their own benefit. It is of paramount importance that these systems have comprehensive security mechanisms to mitigate these security threats. A typical attack vector for a CPS is malicious data supplied by compromised sensors that…

autoencodercyber physical systemsyväoppiminensupport vector machinefault tolerancetiedonlouhintakyberturvallisuusverkkohyökkäyksetsensor datacyber attacktietojärjestelmätInternational Conference on Cyber Warfare and Security
researchProduct

Tactical Analysis of the Winners' and Non-Winners' Performances in a Taekwondo University Championship

2014

The purpose of this study was to identify tactical characteristics of successful athletes who competed in a National University Championship. Results from the study allow taekwondo coaches and competitors to orient their training towards evidence-based practice to achieve success in competitions. Overall, taekwondo athletes performed more attacks than counterattacks. However, winners performed more counterattacks than non-winners. Moreover, winners performed more anticipatory counterattacks (ANC) and less indirect attacks (INA) than non-winners. Lastly, the order of the performance of the actions for non-winners was by decreasing frequency direct attack (DIA), INA, posterior counterattack …

biologyAthletesDirect attackApplied psychologyChampionshipbiology.organism_classificationPsychologyCounterattackSocial Sciences (miscellaneous)International Journal of Sports Science & Coaching
researchProduct

The Complement System: Activation and Control

1985

One of the hallmarks of immunology has been analysis and characterization of the C system in biological fluids. It is composed of 11 proteins of the “classical” pathway:1 C1q, C1r, C1s, C4, C2, C3, C5, C6, C7, C8, and C9. There are three proteins of the “alternative” pathway (IUIS-WHO Nomenclature Committee 1981) B, D, and P. Finally, there are four control proteins: C1 inhibitor (Cl¯ INH) and C4b binding protein (C4b-bp) for the classical pathway, I (C3b inactivator or C3b INA) and H (β1 or C3b INA accelerator) for the alternative pathway, and anaphylatoxin inactivator. Due to the dramatic advances in protein chemistry, these 19 distinct serum proteins have been highly purified and charact…

biologyC4b-binding proteinChemistrychemical and pharmacologic phenomenaBlood proteinsComplement systemC1-inhibitorClassical complement pathwayBiochemistryImmunologybiology.proteinAlternative complement pathwayLysine carboxypeptidaseComplement membrane attack complex
researchProduct

Contributo per una visione contemporanea dell’azienda agricola: tra sostenibilità e sfide del mondo digitale

2023

Le sfide che l’umanità sta affrontando e da cui dipende la sopravvivenza del pianeta, il diffondersi nell’ambito dell’attività agricola di tecnologie digitali sempre più avanzate e la necessità di adottare un approccio sostenibile che preservi le risorse a tutela delle generazioni future hanno condotto l’azienda agricola a cambiare gradualmente volto. Questo libro mira a contribuire a un’aggiornata riflessione sul ruolo dell’imprenditore agricolo e dell’azienda da lui condotta, osservandone l’organizzazione e composizione alla luce delle regole che oggi la disciplinano e guardando alle innovazioni necessarie a garantire il raggiungimento dei pressanti obiettivi climatici e ambientali verso …

blockchainscorte mortecertificationbeni strumentali immateriali Tabella B allegata alla L. n. 232/2016fertilizzantiaugmented reality systemAzienda agricolageo satellite informationinformationintangible goods Table B attached to Law no. 232/2016stockby-productinformazionemain agricultural activitiesegni distintiviknow-howmisure sostegno agricolturaMetaverseenergieattività agricole connessecarbon creditprivatives.attività agricole principalipratiche di decarbonizzazioneFarmsustainabilityfertilizerbasi produttivepatent licensedataMetaversodatismart contractdecarbonization practicelicenze brevettualisostenibilitàdigitalescorte viveproduction basesottoprodotticertificazioniknow howsistemi di realtà aumentataprivativerifiutiavviamento.wastepesticidipesticideinformazioni geosatellitaridigitaldistinctive signSettore IUS/03 - Diritto Agrariorelated agricultural activitieagricultural financing instrument
researchProduct

Trusted Computing and DRM

2015

Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …

business.industryComputer scienceCloud computingTrusted ComputingAttack surfaceConditional accessComputer securitycomputer.software_genreDigital mediaDisk encryptionDirect Anonymous AttestationTrusted Platform Modulebusinesscomputer
researchProduct